Method and device for re-authenticating terminal

A technology of re-authentication and authentication, applied in the field of re-authentication of terminals, can solve the problems of slow re-authentication of WiMAX terminals and high AAA pressure, so as to improve the access success rate, re-authentication speed and increase The effect of access speed

Inactive Publication Date: 2010-01-13
ZTE CORP
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] The purpose of the present invention is to optimize the access process of existing WiMAX terminals in re-authentication, and solve the problems of relatively slow re-authentication of current WiMAX terminals and high AAA pressure. In order to solve these problems, the present invention proposes a The method for the terminal to perform re-authentication includes the following steps: Firmware (which may be a chip embedded in the terminal, such as a WiMAX chip) sends an authentication start message (ie, an EAP-Start message) to an authentication client (such as , Supplicant); the authentication client generates an authentication response message, and sends the authentication response message to the AAA server; the AAA server sends the challenge message of the predetermined algorithm to the authentication client; the authentication client will match the challenge message of the predetermined algorithm The response message of the predetermined algorithm corresponding to the message is sent to the AAA server; the AAA server sends the authentication success message to the authentication client, wherein the authentication response message carries the identification information of the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for re-authenticating terminal
  • Method and device for re-authenticating terminal
  • Method and device for re-authenticating terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0036] The implementation method of the fast re-authentication of the WiMAX terminal in the present invention is described in detail below by introducing the EAP initial authentication process of the existing WiMAX terminal and the EAP re-authentication process of the existing WiMAX terminal in conjunction with the accompanying drawings.

[0037] figure 1 The flow chart of the initial authentication of the WiMAX terminal is shown.

[0038] figure 2 A flow chart of existing WiMAX terminal re-authentication is shown.

[0039] image 3 It is the quick re-authentication flowchart of the WiMAX term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for re-authenticating a terminal, which aims to optimize an access process of the re-authentication of the existing WiMAX terminal and solve the problems of relatively slower re-authentication of the existing WiMAX terminal and higher pressure of an AAA server. The method comprises the following steps: sending an authentication start message (namely an EAP-Start message) to an authentication client (such as Supplicant) by firmware (which can be a chip embedded in the terminal such as WiMAX chip); generating an authentication response message and sending the authentication response message to the AAA server by the authentication client; sending a challenge message of a preset algorithm to the authentication client by the AAA server; sending a response message of the preset algorithm corresponding the challenge message of the preset algorithm to the AAA server by the authentication client; and sending a successful authentication message to the authentication client by the AAA server, wherein the authentication response message carries the identification information of the terminal. In addition, the invention also provides a device for re-authenticating the terminal.

Description

technical field [0001] The present invention relates to the field of wireless communication, and more specifically, to a method and device for re-authentication of a terminal. Background technique [0002] The full name of WiMAX is World Interoperability for Microwave Access, that is, global interoperability for microwave access. It is a broadband wireless access metropolitan area network (Wireless Metropolitan Area Network, WMAN) technology based on IEEE 802.16 series standards. A new air interface standard proposed by the frequency band. The basic goal of WiMAX is to ensure the interconnection and interworking of wireless devices from different manufacturers in the access environment of the metropolitan area network. Personal mobile communication services. Compared with other broadband wireless access technologies, WiMAX has the advantages of wide coverage, strong scalability, and controllable quality of service (QoS). [0003] WiMAX is the standard for mobile broadband...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/08H04W12/041H04W12/0433
CPCH04L63/08
Inventor 李冬贵
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products